Professional Documents
Culture Documents
EBS 286 Network Computing Edited
EBS 286 Network Computing Edited
COURSE TITLE:
This two-credit course book of twenty-four (24) sessions has been structured to
reflect the weekly three-hour lecture for this course in the University. Thus,
each session is equivalent to a one-hour lecture on campus. As a distance
learner, however, you are expected to spend a minimum of three hours and a
maximum of five hours on each session.
To help you do this effectively, a Study Guide has been particularly designed
to show you how this book can be used. In this study guide, your weekly
schedules are clearly spelt out as well as dates for quizzes, assignments and
examinations.
Also included in this book is a list of all symbols and their meanings. They are
meant to draw your attention to vital issues of concern and activities you are
expected to perform.
Blank sheets have been also inserted for your comments on topics that you
may find difficult. Remember to bring these to the attention of your course
tutor during your face-to-face meetings.
Any limitations in this course book, however, are exclusively mine. But the
good comments must be shared among those named above.
THE PROVOST
(CoDEUCC)
UNIVERSITY OF CAPE COAST
CAPE COAST
TEL/FAX O3321-35203, 36947
Content Page
References … … … … … … … … 191
Glossary … … … … … … … … 192
INTRODUCTION
OVERVIEW
UNIT OBJECTIVES
SESSION OBJECTIVES
DO AN ACTIVITY
REFER TO
READ OR LOOK AT
SUMMARY
ASSIGNMENT
Unit Outline
Session 1: Fundamental reasons for networking
Session 2: Network Topologies
Session 3: Types of Networks: Classification based on Size
Session 4: Types of Networks: Classification based on Topology
Session 5: Types of Networks: Classification based on Functional Relationship
Session 6: Types of Networks: Classification based on Media Type
Welcome, this unit is the opening unit to the entire module on Network
Computing. Because of this, we dedicate this unit to treating some fundamental
concepts in computer networking. We will look at what networking is all about
and the discuss computer networking in general. We also look at the reasons
why we setup computer networks in various environments. In computer
networks, either a wire or wireless is used and they are arranged in a particular
format. We shall look at these concepts and this will take to how computer
networks can be classified. Although this unit focuses on the basic concepts in
networking, its information set the tone for further understanding in computer
networking. Let’s then sit back, read and enjoy the unit.
Unit Objectives
By the end of this unit, you should be able to:
1. Define computer networking
2. State the reasons why we setup computer network
3. Describe network topologies
4. Explain types of computer networks based on:
a. Size
b. Topology
c. Functional relationship
d. Protocol and media type
Objectives
By the end of this session, you should be able to:
1. Define computer network
2. State the reasons setting up a computer network
3. State the advantages and disadvantages of networking computers
4. Explain the impact of networking on today’s society
5. The role of human network on data networking
Now read on …
users, the danger of which can be compounded if any network users are
minors. A great deal of attention must be paid to network services to ensure
all network content is appropriate for the network community it serves.
Self-Assessment Questions
Exercise 1.1
Objectives
By the end of this session, you should be able to:
1. Describe the five types of network topology outlined in this session
2. State the advantages and disadvantages of computer networks topology.
Now read on …
Advantages
1. The performance is fast with few nodes and low network traffic.
2. The hub can be upgraded easily.
3. It is easy to troubleshoot, to setup and modify.
4. Only the failed node will get affected, and the rest can work smoothly
Disadvantages
1. If the hub fails then the whole network is stopped because all the nodes
depend on the hub.
2. It requires more cable length.
Not too soon after bus came was a new type of topology known as the ring.
Advantages
1. It is cost effective.
2. Installation of device is easy, each drop cable just need to be connected
to the backbone cable
3. It requires less cable compared to other network topology.
4. Used in small networks
Disadvantages
1. If backbone breaks, then whole network fails.
2. It is difficult to isolate problems due to single cable.
3. If network traffic is heavy or nodes are more the performance of the
network decreases.
4. Cable has a limited length.
5. Is not scalable as there is a limit on the number of host you can connect
with a backbone
Advantages
1. Easy to install.
2. Managing is easier as to add or remove a device from the topology only
two links are required to be changed
3. every device has access to the token and the opportunity to transmit
4. Performs better than a bus topology under heavy network load
5. Does not require network server to manage the connectivity between
the computers
Disadvantages
1 Failure of one host or bad port results in failure for the entire network.
2 Moves, adds and changes of devices can affect the network
3 Network adapter cards and MAU’s are much more expensive than
Ethernet cards and hubs
4 Much slower than an Ethernet network under normal load
• Full mesh: All host has point to point connection with all other host in
the network. If we have n devices in the network then each device must
be connected with (n-1) devices of the network. The number of
connections/links required in mesh topology is calculated using the
formula: n(n-1)/2.
• Partially Mesh: Not all hosts have point-to-point connection to every
other host. Hosts connect to each other in some arbitrarily fashion. This
topology exists where we need to provide reliability to some hosts out
of all
Advantages
1. No data traffic issues as there is a dedicated link between two devices
which means the link is only available for those two devices.
2. Mesh topology is reliable and robust as failure of one link doesn’t
affect other links and the communication between other devices on the
network.
3. Mesh topology is secure because there is a point to point link thus
unauthorized access is not possible.
4. Fault detection is easy.
Disadvantages
1. Number of wires required to connect each system is tedious and
headache.
2. Since each device needs to be connected with other devices, number of
I/O ports required must be huge.
3. Scalability issues because a device cannot be connected with large
number of devices with a dedicated point to point link.
Advantages
1. This topology is the combination of bus and star topology.
2. This topology provides a hierarchical as well as central data
arrangement of the nodes.
3. As the leaf nodes can add one or more nodes in the hierarchical chain,
this topology provides high scalability.
4. The other nodes in a network are not affected, if one of their nodes get
damaged or not working.
5. Tree topology provides easy maintenance and easy fault identification
can be done.
6. A callable topology. Leaf nodes can hold more nodes.
7. Supported by several hardware and software vendors.
8. Point-to-point wiring for individual segments.
Disadvantages
1. This network is very difficult to configure as compared to the other
network topologies.
2. Due to the presence of large number of nodes, the network performance
of tree topology becomes a bit slowly.
3. If the computer in first level is erroneous, next level computer will also
go under problems.
Self-Assessment Questions
Exercise 1.2
1. Describe the five types of network topology outlined in this
session
2. State the four (4) advantages and disadvantages of computer networks
topology.
Objectives
By the end of this session, you should be able to:
1. Classify the types of computer networks based on size
2. State the four advantages and disadvantages of the types of computer
networks
Now read on …
routers, access points etc. that enable a host device to connect to servers in
house, web servers, and other LANs via wide area network. “LANs have
become the most popular form of computer networks. The primary topologies
used in LANs are star, ring, and bus.” (Ivanova & Jurczyk, 2003)
• The benefits of LANs include the ability to use single Internet
connection
• Ability to share files with one other people on the network
• The capacity to print to shared printers, be accessed and even
controlled by one another. they are inexpensive
• widely available
Let us take UCC campus for example, to maintain the information between all
the departments, the whole campus is connected through the Internet, Library,
hostels, departments, administration, and all connected to the Wi-Fi to
maintain the connection amongst each other. The connections is only
maintained on campus, no other unauthorized user can retrieve the information
out of the campus. Any confidential or student information, faculty are
maintained confidentially in the campus area network.
.
Disadvantages
• WAN faces more security issues compared to LAN and WAN due to
the many devices/technologies connected together
• Data transferred are prone to attack. Devices for instance, computers
attached to WANs, requires enabled firewall and antivirus installation
to avoid intrusion by hackers and other malicious attack
• It is very complex and expensive to install WAN due to geographical
coverage.
• It becomes difficult for WAN to work in areas where there is no
electricity
• Very high cost of maintenance. Particularly data centres
Summary
In this session we discussed types of networks based on size. This include
personal area networks, local area networks, campus area networks,
metropolitan area networks and wide area networks. These classification
describes how wide a network spans. Let’s answer the self-assessment
questions.
Self-Assessment Questions
Exercise 1.3
Objective
By the end of this session, you should be able to:
1. Classified computer networks based on topology.
Now read on …
Star network
A star network is a type of network that uses a central device, such as a hub or
switch, to interconnect computers in a network. This type of network could be
a local area network (LAN) in terms of size. In this regard, a network that
belongs these two classifications can be referred to as Star LAN network. It
basically means a star arrangement of cables and computer in a local area
network.
Bus Network
The second type of network based on the topology classification is the bus
topology. In bus topologies, it only one cable that connects all computing
devices on the network. This mostly happens in local area networks and they
are referred to as bus local area networks (Bus LANs). A bus LAN is a type of
local area network that is implemented based on bus topology.
Ring Network
As indicated already, the third type of network based on topology is ring
network. In ring networks, all network devices are network devices are
connected using one cable which forms a loop. Data moves in one direction
and there is collision of data in this kind of network. When a local area
network is implemented based on ring topology, it is referred to as Ring LAN.
Tree Network
This is a kind of network that is implemented based on the tree topology. This
can also be referred to as extended star topology. Tree networks are mostly
found in schools and on campuses. A local area network or campus area
network that is implemented based on tree topology is known as Tree LAN or
CAN.
Mesh Network
Mesh network is a kind of network that is implemented using the mesh
topology. In such networks, devices are connected among themselves in such a
way that two devices have a point-to-point connection with each other. One
advantage of such networks is that there is redundancy in terms of connection
which ensures that connections between nodes/devices are always up and
running. Nodes/computers have more than one route to their destination. This
kind of network can be implemented on WAN, CAN, and LAN. A network
that has the characteristics of a mesh and LAN is referred to as Mesh LAN. We
can also have Mesh WAN network.
Self-Assessment Questions
Exercise 1.4
1. Describe two types of network based on topology.
Objectives
By the end of this session, you should be able to:
1. Explain what a server-based network is
2. Explain what a client-server communication is
3. Explain Peer-to-peer network
4. Distinguish between Server-based, Client – server communication and
Peer-to-peer net work
Now read on …
2. All the required data is concentrated in a single place i.e. the server. So
it is easy to protect the data and provide authorisation and
authentication.
3. The server need not be located physically close to the clients. Yet the
data can be accessed efficiently.
4. It is easy to replace, upgrade or relocate the nodes in the client server
model because all the nodes are independent and request data only from
the server.
5. All the nodes i.e. clients and server may not be built on similar
platforms yet they can easily facilitate the transfer of data.
6. centralized management, data storage, administration, and security
make it the network model of choice.
3. It is easy to scale the peer-to-peer network and add more nodes. This
only increases the data sharing capacity of the system.
4. None of the nodes in the peer-to-peer network are dependent on the
others for their functioning.
Self-Assessment Questions
Exercise 1.5
Objectives
By the end of this session, you should be able to:
1. Classify computer network based on media type
2. Mention types of network based on media type
Now read on …
Transmission media is classified into two types, namely wired media, and
wireless media. We don’t to go into detail because communication channel has
been fully discussed in Unit four (4).
Examples of the wired media, also called guided media include twisted pair
cable, coaxial cable and optical cable. A wired network connection is described
as a configuration that involves cables which establish a connection to the
Internet and other devices on the network. Data is transferred from one device
to another or over the Internet using Ethernet cables.
Wireless Network
As the name suggests, wireless is a type of network that does not use physical
wires or cables to connect or link nodes/computers on the network. It transmits
and receives signals broadcast through the atmosphere. This type of network
make use of microwave, radio, and infrared to transmit signals. This kind of
network can be implemented as a local area networks, campus area networks,
and even metropolitan area networks through the Worldwide Interoperability
for Microwave Access (WiMax) technology.
Self-Assessment Questions
Exercise 1.6
1. State two examples of networks based on media type
2. What are ethernet networks?
Unit Outline
Session 1: Common Network Devices and Tools
Session 2: Network Devices: Firewalls, Access Point and DHCP Servers
Session 3: Encryption Devices
Session 4: Specialize Network Devices
Session 5: Virtual Network Components
Session 6: More on Network Components
Unit Objectives
After completing this Unit, you should be able to:
1. Mention network components and devices
2. Explain the functions of DHCP Servers
3. State the purposes of encryption
4. Explain the advantages and disadvantages of virtualisation
5. Explain the functions of proxy servers and firewalls
Objectives
By the end of this session, you should be able to:
1. describe network hubs, switches, and bridges
2. State the difference between hubs and switches
Now read on …
1.1 Hubs
A network hub serves as a central point for all devices in a LAN. It connects
multiple devices in a network. It is basically a multiple-port repeater because it
repeats an electrical signal that comes in one port out all other ports (except the
incoming port). A hub operates at layer 1 of the OSI model, meaning that, it is
not intelligent to filter or find the best path to direct data packets. instead, data
packets are sent to all connected devices leading to inefficiencies and wastage.
Inefficiencies because all devices on the LAN will receive data, and the data
will eventually reach the correct destination, but with a lot of unnecessary
network traffic. The image below shows a hub that has sent out the receiving
signal out all other ports, except the incoming port.
Modern LANs rarely use hubs; switches are used instead. Hubs have many
disadvantages, including:
• they operate in half-duplex.
1.2 Switches
A network switch is a device that connects devices together on a LAN just like
a hub. A switch is essentially a multiport network bridge and performs the
same basic functions as a bridge, but at much faster speeds and with many
additional features. Each port on a switch is in a separate collision domain and
can run in the full duplex mode, which means that hosts connected to a switch
port can transmit to the switch while the switch transmits to them.
An Ethernet switch usually works at the Data link layer of the OSI model
(Layer 2). It manages the flow of data across a network by inspecting the
incoming frame’s destination MAC address and forwarding the frame only to
the host for which the message was intended. Each switch has a dynamic table
(called the MAC address table) that maps MAC addresses to ports. With this
information, a switch can identify which system is sitting on which port and
where to send the received frame.
1.3 Bridges
It can be interesting if you want to relate this bridge to road bridges that we
know. In reality, road bridges connect two roads separated by a river, a railway
line or any other of this kind. A network bridge is a network device that
divides a local area network (LAN) into segments. It can also be used to
connect multiple LAN into a single larger LAN. When bridges are used to
divide a LAN into segments each segment becomes a representation of the
separate collision domain, the number of collisions on the network is
minimized. In this case each collision has a separate bandwidth, so the bridge
also improves the network performance.
The bridge operates at the layer 2 of the OSI model (you will learn about the
OSI model in later in this course). It inspects inbound traffic and decides
whether to forward or filter it. Thus, each the bridge inspects the mac address
of each incoming ethernet frame and forwards it to the designated host on
another segment of the network. The figure below shows the diagram of a
bridge in segmented LAN.
A 4-port Bridge
Bridge Switch
most bridges have A switch can have hundreds of ports
only 2 or 4 ports
bridges are Switches are hardware-based and use chips (ASICs)
software based when making forwarding decisions, which makes
them much faster than bridges.
Bridges can have switches can have multiple spanning-tree instances
only one.
switches can have multiple broadcast domains (one per
VLAN).
Hub Switch
They operate in the physical layer of the They operate in the data link
OSI model. layer of the OSI model.
It is a non-intelligent network device that It is an intelligent network
sends message to all ports. device that sends message to
selected destination ports.
It primarily broadcasts messages. It is supports unicast, multicast
and broadcast.
Transmission mode is half duplex. Transmission mode is full
duplex.
Collisions may occur during setup of Collisions do not occur since
transmission when more than one computer the communication is full
place data simultaneously in the duplex.
corresponding ports.
They are passive devices; they don’t have They are active devices,
any software associated with it. equipped with network
software.
They generally have fewer ports of 4/12. The number of ports is higher –
24/48.
Network Tools
(Please such through the internet for pictures of the following tools)
A wire crimper is a tool that you use to attach media connectors to the ends of
cables.
Wire strippers come in a variety of shapes and sizes. Some are specifically
designed to strip the outer sheathing from coaxial cable, and others are designed
to work with UTP cable.
Punchdown tools are used to attach twisted-pair network cable to connectors
within a patch panel. Specifically, they connect twisted-pair wires to the IDC.
Voltage event recorders are used to monitor the quality of power used on the
network or by network hardware.
Temperature monitors keep track of the temperature in wiring closets and server
rooms.
Toner probes are used to locate cables hidden in floors, ceilings, or walls and to
track cables from the patch panel to their destination.
Protocol analyzers can be hardware- or software- based. Their primary function
is to analyze network protocols such as TCP, UDP, HTTP, FTP, and more.
A TDR is a device used to send a signal through a particular medium to check the
cable’s continuity.
An OTDR performs the same basic function as a wire media tester, but on optical
media.
Packet sniffers are either a hardware device or software that eavesdrop on
transmissions that are traveling throughout the network.
Throughput testers identify the rate of data delivery over a communication
channel.
Port scanners are a software-based utility. They are a security tool designed to
search a network host for open ports on a TCP/IP-based network.
Self-Assessment Questions
Exercise 1.1
Objectives
By the end of this session, you should be able to:
1. Explain the role of dynamic host configuration protocol
(DHCP) servers in a network
2. Describe the functions of a firewall
3. Explain the functions of a router
4. Describe the role of access point in computer networks
Now read on …
1. ROUTERS
The word router comes from the word route, which means a path, way, track or
direction. There are so many routes and junctions within networks. The routes
are the different networks within a large network while the junctions can be
compared to the devices connecting the different networks. One of such
devices is the router. As the name depicts routers routes or direct incoming or
outgoing data it receives from one network to another in the fastest and most
efficient way. Thus, they are responsible for receiving, analyzing, and
forwarding data packets among the connected computer networks. When
routers receive data, they inspect the packet header (destination address),
verify from the routing table to establish how to reach the destination and then
forward the packet to the along the route or the next hop (possibly another
router on the routing table) on the route. Routers are networking devices
operating at layer 3 or a network layer of the OSI model.
2. Access Point
An access point (AP) or wireless access (WAP) is a device that creates a
wireless local area network (WLAN) usually in an office or large building. An
access point connects to a wired router, switch, or hub via an Ethernet cable,
and projects a Wi-Fi signal to a designated area. Thus WAP allows wireless
capable devices to connect to a wired network. For example, if you want to
enable Wi-Fi access in your company's reception area but don’t have a router
within range, you can install an access point near the front desk and run an
Ethernet cable through the ceiling back to the server room.
There was a time when these IP addresses were entered manually into the
network settings of each client workstation. Manually set, or static, IP
addresses were very difficult to maintain in large networks. Adding to the time
it takes to individually set the IP addresses is the fact that each address must be
unique. Duplicate IP addresses will prevent a successful connection to the
network, meaning that all network services will be unavailable to the
workstations with the duplicate addresses. When you’re setting static IP
addresses, it is essential to track assigned IP addresses carefully to prevent
duplicating addresses and to make future expansion and troubleshooting easier.
In larger networks, the assignment of manual addresses can be a nightmare,
especially when IP addressing schemes can be changed and computers can be
moved, retired, or replaced. That’s where DHCP comes in. DHCP assigns IP
addresses, eliminating the need to assign IP addresses individually and making
the job of network administrators considerably easier. When a DHCP server is
running on a network, the workstation boots up and requests an IP address
from the server. The server responds to the request and automatically assigns
an IP address to the computer for a given period, known as a lease. The
workstation acknowledges the receipt of the IP address, and the workstation
has all the information it needs to become part of the network. This
communication between the server and the workstation happens completely
automatically and is invisible to the computer user.
Firewall
A firewall is a computer networking security device - software or hardware -
which restrict unauthorized access into your personal computers or
organizational network. It also restricts also filter traffic coming in from the
internet or going out of your LAN.
Function of firewall
• It is designed to protect your computer or network resources and data
by filtering and blocking unsolicited incoming traffic or unrecognized
sources from gaining unauthorized access to your private data on your
computer.
• It can also block malicious applications, software, and programs from
infecting your computer.
• Firewall controls access between other segments within the same or a
single network. Thus, within the same organization, firewall can also be
placed between two segments. For example the training unit and
administration unit.
implemented with very little configuration. They protect all systems behind the
firewall from outside sources. Hardware firewalls are readily available and
often are combined with other devices today. For example, many broadband
routers and wireless access points have firewall functionality built in. In such a
case, the router or AP might have a number of ports available to plug systems
into.
Types of firewalls
There are several firewalls that can be implemented depending on the size of
the organization
Packet-filtering firewalls
This is a software firewall that can block network traffic IP protocol, an IP
address, and a port number. This type of firewall is the most basic form of
protection and is meant for smaller networks.
Virtual firewalls
A virtual firewall is an appliance used in a cloud-based system, both private
and public. This type of firewall is used to assess and manage internet traffic
over both physical and virtual networks.
Self-Assessment Questions
Exercise 1.5
Objectives
By the end of this session, you should be able to:
1. Describe the two types of encryption
2. Explain the advantages and disadvantages of the hardware and software
encryptions
Now read on …
Self-Assessment Questions
Exercise 1.5
1. State and describe the two types of encryptions
2. Give two (2) advantages and disadvantages each of the two types of
encryptions
Objectives
By the end of this session, you should be able to:
1. Describe the functions of bandwidth shaper
2. Explain the functions of Multilayer and content switches
3. State the functions of Proxy server
4. Describe the functions of VPN Connector.
Now read on …
Bandwidth shaping also refers to as the mechanism used to control the use of
bandwidth on a network. With this mechanism, network administrators can
who uses bandwidth, the purpose for using the bandwith and what time of the
day the bandwidth can be used. This allows the administrator to set priorities
for data travelling to and from the internet or intranet.
A multilayer switch is one that can operate at both Layer 2 and Layer 3 of the
OSI model, which means that the multilayer device can operate as both a
switch and a router. Also called a Layer 3 switch, the multilayer switch is a
high-performance device that actually supports the same routing protocols that
routers do. It is a regular switch directing traffic within the LAN; in addition, it
can forward packets between subnets.
NOTE
Note that a multilayer switch operates as both a router and a switch.
Content servers can help with load balancing because they can distribute
requests across servers and target data to only the servers that need it or
distribute data between application servers. For example, if multiple mail
servers are used, the content switch can distribute requests between the servers,
thereby sharing the load evenly. This is why the content switch is sometimes
called a load-balancing switch.
Transparent proxies
Transparent proxies has no added privacy or security. It allows webservers to
obtain clients actual IP address and they also can tell which client is connecting
via a proxy. Transparent proxies are normally used in for content filtering and
caching instead and not for security purposes. They are normally used on a
corporate or school network
Anonymous proxies
Anonymous proxies also known as distorting proxies pass fake client IP
address to webservers. In other words they promise not to disclose client IP to
websites or services used by the client. like transparent proxies, anonymous
proxies also don’t conceal the fact that you’re using a proxy. If some sites
choose to deny service to proxy users, you won’t be able to visit them while
using an anonymous proxy. These types of proxies are preferred if you seek to
gain a some control over your online privacy.
If a client computer wants to access a web page, the request is sent to the proxy
server rather than directly to the Internet. The proxy server first determines
whether the request is intended for the Internet or for a web server locally. If
the request is intended for the Internet, the proxy server sends the request as if
it originated the request. When the Internet web server returns the information,
the proxy server returns the information to the client. Although a delay might
be induced by the extra step of going through the proxy server, the process is
largely transparent to the client that originated the request. Because each
request a client sends to the Internet is channeled through the proxy server, the
proxy server can provide certain functionality over and above just forwarding
requests.
Content filter
Another import role of the proxy server is its ability to allow the network
administrator to filter client request. This administrative function is meant to
allow network administrators regulate the incoming request with a firewall.
Thus the administrators can block or disallow access to undesired websites.
They can also act as content filters by blocking undesired outgoing traffic that
company workers or students may want to visit. The act of determining
outgoing or incoming traffic is done through what is called access control list
(ACL). The ACL is a list of allowed or nonallowed websites.
Firewalls: the proxy server serves as the best place to host the network
firewall. We shall discuss firewalls later in this unit. But note that fire is a
security technology designed to protect the network from hacking and
malwares. It is designed to intercept either approve or block incoming traffic
before it reaches the network.
Despites their ability to hide client’s information proxy server protection is not
likely to be as strong as that of VPN which hides your IP address while also
shielding your traffic from would-be snoopers with encryption.
Hello Students, all too soon, we have come to the end of this
session. We want state that proxy servers are very important
in private networks. They do caching and filtering thereby preventing
unauthorized access to a network. Don’t forget to a proxy server in your
network. Let’s move to the last but one session of this unit.
Self-Assessment Questions
Exercise 2.4
1. State four specialized network devices
2. Describe the functions of the devices listed in question 1
Objectives
By the end of this session, you should be able to:
1. Define virtualization
2. Mention the benefits virtual Desktop in computer networks
3. Explain the benefits of virtual servers
Now read on …
A virtual desktop is a computer operating system that does not run directly on
the endpoint hardware from which a user accesses it. Virtual desktops are
accessible through client software called virtual machine (virtual machines are
installed on servers, pcs or in the cloud to create multiple desktops) that is
installed directly on a PC which presents the desktop to the user and allows
them to interact with it using a keyboard, mouse, touch screen and peripherals.
Virtual desktops can also be installed on a physical machine hosted on premise
or in the cloud. Within the cloud and a networked environment each virtual
desktop must be connected to the internet or intranet and configuration
permissions. Virtual machines hosted in the cloud allows end users to access
their unique desktop environment, including operating system and
applications, remotely over a network, through client software or a web
browser on the endpoint device of their choice. The technology that allows us
to run desktop operating systems on VMs on on-premises servers is known as
virtual desktop infrastructure (VDI). Offerings that do the same, but in the
cloud, are known as desktop as a service (DaaS).
Nonpersistent Desktops
Also called stateless desktops, non-persistent desktops do not retain personal
information. Each time a user logs in, he gets a fresh, generic virtual desktop
from a golden image that all users share. At the end of each session, the
desktop reverts to its original state. The primary benefit of the nonpersistent
desktop approach is that it requires less storage
Self-Assessment Questions
Exercise 1.5
1. Define virtualization
2. State and explain five benefits of virtual Desktop in computer networks
3. State and explain five benefits of virtual servers in computer networks
Objectives
By the end of this session, you should be able to:
1. State at least three components of a virtual switch.
2. Explain the functions of virtual network devices
3. State the differences between physical switch and virtual switch
Now read on …
Virtual PBX systems are connected through the internet hence users can
receive calls on any phone in any location. Simply forward phone calls to an
offsite phone (home office, cell, friend’s house) and you can make sure each
and every call is answered in a timely manner. Organizations that use virtual
PBX reduce phone hold times, increase office efficiency. Customers can also
reach to the right staff without speaking to different employees in the
organization. This leads to customer satisfaction and retention. The commonly
used
Benefits of NaaS
NaaS simplifies how hardware and software technologies are managed and
consumed. It enables greater speed, agility, and scale. SD-WAN can be
deployed as a value-added service with NaaS to enhance performance,
security, redundancy, and application experience.
With the importance of NaaS, there is no doubt that it will continue to evolve
to include additional capabilities for scale as well as depth and breadth of
services.
Flexibility
NaaS services are delivered through a cloud model to offer greater flexibility
and customization than conventional infrastructure. Changes are implemented
through software, not hardware. This is typically provided through a self-
service model. IT teams can, for example, reconfigure their corporate networks
on demand and add new branch locations in a fraction of the time. NaaS often
provides term-based subscription with usage billing and multiple payment
options to support various consumption requirements.
Scalability
NaaS is inherently more scalable than traditional, hardware-based networks.
NaaS customers simply purchase more capacity instead of purchasing,
deploying, configuring, and securing additional hardware. This means they can
scale up or down quickly as needs change.
Self-Assessment Questions
Exercise 1.5
Unit Outline
Session 1: The networking models: Open System Interconnection (OSI)
Session 2: The TCP/IP Four-layer model
Session 3: OSI and Network Component
Session 4: Networking Protocols 1 – Network Access, Internet and Host-To-
Host Layer Protocols
Session 5: Networking Protocols 2 – Process/Application Layer Protocols
Session 6: IP Address and Dynamic Host Configuration Protocol (DHCP)
Unit Objectives
By the end of this unit, you should be able to:
1. Explain the functions of the OSI model and define the
communications subnetwork
2. Explain the TCP/IP four-layered model
3. Explain the OSI model in relation to network components
4. Explain the connection-oriented protocols and the functions of
protocols on the OSI model
5. Explain other networking protocols of the OSI model
6. Understand IP addresses and how Dynamic Host Configuration
Protocol (DHCP) works
Objectives
By the end of this session, you should be able to:
a) define the OSI model.
b) Identify the seven layers of the OSI Mode
c) explain the functions of the model
d) explain the characteristics and functions of the layers in the
model.
Read on now…
Open Systems Interconnect (OSI) reference model is one of the most important
networking concepts that networking students must understand in order to
appreciate how networks function. This conceptual model was created by the
International Organization for Standardization (ISO) in 1978 and revised in
1984. It describes a network architecture that enables data to be passed
between computer systems. It is structured into seven (7) layers and provides a
Computer A Computer B
7 Application 7 Application
6 Presentation 6 Presentation
5 Session 5 Session
4 Transport 4 Transport
3 Network 3 Network
2 Data Link 2 Data Link
1 Physical 1 Physical
Figure 3.1. OSI reference model
2. Path Selection: The network layer is also responsible for route selection,
or path selection. This refers to determining the best path for the data to
take throughout the network. In contrast to the data link layer, which uses
MAC addresses to communicate on the LAN, network layer protocols use
software configured addresses and special routing protocols to
communicate on the network.
3. The network layer breaks up segments from the transport layer into smaller
units, called packets, on the sender’s device, and reassembling these
packets on the receiving device.
2. It does error checking, i.e. Protocols at the transport layer ensure that data
is correctly sent or received.
3. It also does service addressing, i.e. the transport layer ensures that data is
passed to the right service at the upper layers of the OSI model.
6. Data flow-control: This layer is also responsible for data flow control,
which refers to how the receiving device can accept data transmissions.
Dear student, all too soon we have come to the end of this
session. This session basically treated the OSI Model which
is a well-known model in computer networks. We got to know that the OSI
model is conceptual model not a physical one but it is very important for so
many reasons. Some of these reasons were enumerated in this session. We
have you have learnt a lot from this session. The next session takes us to
looking at the TCP/IP Four-layer model. Continue to read on…
Self-Assessment Questions
Exercise 3.1
1. What does OSI mean?
A. Open System Interface
B. Open Systems Interconnection
C. Open Shortest Interior
D. Open Source Interconnection
2. Which organization created the OSI model?
A. Ghana Standard Authority
B. International Organisation for Standardisation
C. Department of Defense
D. International Standard Board
3. Which is the fourth layer in the OSI model
A. Presentation layer
B. Session layer
C. Physical layer
D. Transport layer
Objectives
By the end of this session, you should be able to:
1. Explain what the TCP/IP model is about
2. Compare the layers of the OSI and TCP/IP models.
TCP/IP stands for Transmission Control Protocol, Internet Protocol. This is the
main protocol that runs the internet. The Transmission Control Protocol (TCP)
handles reliable delivery of messages, and The Internet Protocol (IP) manages
the routing (route) of network transmission from the sender to the receiver.
TCP/IP defines how electronic devices such as computers are connected to the
Internet and how data is transmitted between them.
As indicated earlier, the TCP/IP model functions the same manner as the OSI
with only four layers. Figure 3.2 shows how these four layers line up with the
seven layers of the OSI model.
What is IP?
The Internet Protocol (IP) is the method for sending data from one device to
another across a network and for that matter the internet. IP is the main
protocol within the internet layer of the TCP/IP. Every device on a network has
a unique address called an IP address that identifies it and enables it to
communicate with and exchange data with other devices connected to the
network or internet. It will be looked at into detail in the later part of this
module.
Internet Layer
1. The Internet layer exists for routing and providing a single network
interface to the upper layers. IP provides the single network interface for
the upper layers. This layer maps to the network layer on the OSI layer.
Host-to-Host Layer
1. This layer shields the upper layers from the process of sending data.
2. Also provides an end-to-end connection between two devices during
communication by performing sequencing, acknowledgments, checksums,
and flow control.
3. Applications using services at this layer can use two different protocols:
TCP and UDP.
4. It maps to the transport layer on the OSI model.
Self-Assessment Questions
Exercise 3.2
1. State three differences between the OSI model and TCP/IP model.
2. List two functions of the Process Application layer of the DoD/TCP/IP
model
3. Which layer on the OSI model does Network layer of DoD model maps to?
Objectives
By the end of this session, you should be able to:
1. Determine where each device works on the OSI model
2. Explain the functions of each device on the OSI model
Access Point(AP)
An access point (APs) is a transmitter and receiver (transceiver) device used to
create a wireless local area networks (WLAN). AP typically are a separate
network device with a built-in antenna, transmitter, and adapter. An AP uses
the wireless infrastructure network mode to provide a connection point
between WLANs and a wired Ethernet LAN. APs also typically have several
ports, giving you a way to expand the network to support additional clients.
APs operate at the Layer 2 of the OSI model.
Self-Assessment Questions
Exercise 3.3
1. At which layer does the network interface card operate?
A. Layer 5
B. Layer 2
C. Layer 1
D. Layer 3
2. The Switch and Router operate at the same layer.
True/False
3. What name is given to the unique number found on every NIC?
A. Self-Address
B. MAC Address
C. Man Address
D. IP Address
Objectives
By the end of this session, you should be able to
1. Explain network protocol
2. Identify some common network protocols
3. Determine the functions protocols on a network
Read on now…
In the 1990s, you had a choice of network protocols you could install on your
computer, depending on the computing environment such as windows,
Macintosh, etc. In small networks where Windows operating systems like
Windows 3.1 or Windows 95 were used, the Windows-specific protocol like
NetBEUI prominent. A network with Novell NetWare 4.x servers typically ran
IPX/SPX. Both these protocols are obsolete now and are found only in
As the name suggests, the TCP/IP stack comprise of two main protocols:
Transmission Control Protocol and the Internet Protocol. It is in these
protocols that the other protocols exist. For this reason, we will start our
discussion by first discussing these two protocols.
When the data session is completed, a similar process is used to close the
session. This three-step session establishment and acknowledgment process is
called the TCP three-way handshake.
They can do this because they wait for all the packets in a message to be
received before considering the transmission complete. On the sending end,
connection-oriented protocols also assume that a lack of acknowledgment is
sufficient reason to retransmit.
vii. UDP does not provide reliability, flow control, and error recovery
mechanism.
Features
i. IP is a set of rules that defines how computers communicate over a
network.
ii. IP software performs the routing function.
iii. IP is unreliable and connectionless datagram protocol.
Each grouping of numbers separated by a dot (period) is an 8-bit value that can
range from 0 to 255. Because an IP address has 32 bits, a total of 232 addresses
are possible, which is approximately 4 billion. That might seem like a lot of
addresses, but as you learn later, many are wasted, and available addresses to
assign to devices on the Internet are running out. Example of IP version 4 is
172.31.149.10. A session will be dedicated to treat this topic.
IP version 6 is 128 bits (16 bytes) long written in hexadecimal format. Most
Application-layer protocols require no changes either, except those dealing
directly with IP addresses, such as DHCP and DNS.
Buffer Full
If a router’s memory buffer is full, it will use ICMP to send out this message
until congestion is decreased.
Ping
Ping stands for Packet Internet Groper. It uses ICMP echo request and replies
messages to check the physical and logical connectivity of machines over the
network.
Tracert
It stands for trace route. This command is used to see the exact path that the
data packet is taking on its way to the destination.
Ethernet Standards
i. It is a computer network technology that is widely used by different
networks like LAN, MAN, CAN, and WAN.
ii. It is a fast and reliable network solution.
iii. Ethernet can operate at different speeds over different types of media,
and each variation is associated with an IEEE standard.
iv. There is also wireless Ethernet that can handle a large number of users.
v. Wireless Ethernet is less expensive than a wired Ethernet network.
vi. The original ethernet transmits 10Mbps
Fast Ethernet
This is an improved form of Ethernet
It can transfer data at a rate of 100 Mbps.
It uses a twisted pair and fiber optic cable for communication.
Self-Assessment Questions
Exercise 3.4
1. What is Network Protocol?
2. state two differences between TCP and UDP
3. List and explain two Network Access protocols
4. what is Ethernet?
5. List three (3) messages sent by the ICMP.
Objectives
By the end of this session, you should be able to:
1. Identify the upper layers protocols
2. Determine the functions of the Process/Application layer protocols
3. State the characteristics of these protocols
Read on now…
Telnet
Telnet stands for Telecommunication Network. It is also called as Remote
Access Protocol because it is used to access remote machines over the Internet.
A user on a remote client machine called the Telnet Client. A machine who
access to resources called the Telnet server. It uses TCP port no 23. It is less
secure, and all data exchange without using any form of encryption.
iv. TFTP requires that you request not only exactly what you want but also
the particular location. Unlike FTP, which uses TCP as its transport
protocol to guarantee delivery, TFTP uses UDP.
v. It uses UDP port number 69 for TFTP server.
vi. It does not provide authentication and security while transferring the
files.
XWindow
i. XWindow was used to perform client/server operations like writing
client/server applications based on a Graphical User Interface (GUI).
ii. It allowed the client to run a program on one computer and have to
display it on window server of another computer.
Weaknesses of POP3
One of the problems with POP3 is that the password used to access a mailbox
is transmitted across the network in clear text. This means that if people want
to, they could determine your POP3 password with relative ease. This is an
area in which IMAP4 offers an advantage over POP3. It uses a more
sophisticated authentication system, which makes it more difficult for people
to determine a password.
explained networking protocols to you. Let’s move to the next and the last
session of this unit.
Self-Assessment Questions
Exercise 3.5
1. which protocols is responsible for downloading of mails from mail
servers?
2. State two functions of each of the following protocols:
a. TFTP
b. HTTP
c. Telnet
d. Secure Shell
e. POP3
f. SMTP
Objectives
By the end of the session, you should be able to:
1. Identify versions of IP addresses
2. Describe Classes of IP Address
3. Identify the difference between public and private networks
4. Explain the purpose of DHCP.
5. Explain the properties of DHCP
6. Describe the DHCP process
Please continue…
IP Addressing
As explained early on in this Unit, internet protocol (IP) addressing is one of
the concepts that possesses a lot of challenges to network administrators. To
communicate on a network, each devices must be assigned a unique address.
The address determines which network the device is connected to and the
number of nodes on that network. In other words, the IP address provides two
pieces of information. It’s a bit like a street name and house number in a
person’s home address. It tells the network address and the host address. Each
device on a logical network segment must have the same network address as
all the other devices on the segment. A logical network refers to portion of a
network that devices on the portion bear the same address. All the devices on
that network segment must then have different node addresses.
128 64 32 16 8 4 2 1
255
255 255 255
. . .
Each bit in the octet can be either a 1 or a 0. If the value is 1, it is counted as its
decimal value, and if it is 0, it is ignored. If all the bits are 0, the value of the
octet is 0. If all the bits in the octet are 1, the value is 255, which is
128+64+32+16+8+4+2+1.
By using the set of 8 bits and manipulating the 1s and 0s, you can obtain any
value between 0 and 255 for each octet.
IP Address Classes
IP addresses are grouped into logical divisions called classes. The IPv4 address
space has five address classes (A through E), although only three (A, B, and C)
are used to assign addresses to clients. Class D is reserved for multicast
addressing, and Class E is reserved for future development.
Of the three classes available for address assignments, each uses a fixed-length
subnet mask to define the separation between the network and the node
address. To determine the class of an IP address, we use the first octet. If the
first octet ranges between 1- 126, it is in class A. if the first octet ranges
between 128 – 191, then it is in class B, if the first octet ranges between 192 –
223 then the IP is in class C. Examples of classes of IP addresses are displayed
in Table 3.6.
A Class A address uses only the first octet to represent the network portion, a
Class B address uses two octets, and a Class C address uses the first three
octets. The upshot of this system is that Class A has a small number of network
addresses, but each Class A address has a very large number of possible host
addresses. Class B has a larger number of networks, but each Class B address
has a smaller number of hosts. Class C has an even larger number of networks,
but each Class C address has an even smaller number of hosts. The exact
numbers are provided in Table 3.6.2. In IP addressing, another set of numbers,
called a subnet mask, is used to define which portion of the IP address refers to
the network address and which refers to the node address.
Notice in Table 3.6.2 that the network number 127 is not included in any
of the ranges. The 127.0.0.1 network ID is reserved for the local
loopback. The local loopback is a function of the protocol suite used in the
troubleshooting process.
CoDEUCC/Bachelor in JHS Education 119
UNIT 3 IP ADDRESSING AND DYNAMIC HOST
SESSION 6 CONFIGURATION PROTOCOL (DHCPP)
If you are connecting a system to the Internet, you need to get a valid
registered IP address. Most commonly, you obtain this address from your
Internet Service Provider(ISP). In Ghana, ISPs may include Vodaphone Ghana
Limited, MTN Ghana Limited and so on. Alternatively, if you wanted a large
number of addresses, for example, you could contact the organization
responsible for address assignment in your area. You can determine who the
regional numbers authority for your area is by visiting the IANA website.
IANA means Internet Assigned Numbers Authority.
Because of the nature of their business, ISPs have large blocks of IP addresses
that they can assign to their clients. If you need a registered IP address, getting
one from an ISP will almost certainly be a simpler process than going through
a regional numbers authority. Some ISPs’ plans actually include blocks of
registered IP addresses, working on the principle that businesses will want
some kind of permanent presence on the Internet. Of course, if you discontinue
your service with the ISP, you can no longer use the IP address it provided.
Three ranges are defined in Request For Comment (RFC) 1918—one each
from Classes A, B, and C. You can use whichever range you want, although
the Class A and B address ranges offer more addressing options than Class C.
Table 3.6.3 defines the address ranges for Class A, B, and C addresses.
IPv4 uses a 32-bit addressing scheme. This gives IPv4 a total of 4,294,967,296
possible unique addresses that can be assigned to IP devices. However, the
number of IP-enabled devices increases daily at an incredible rate. It is also
important to note that not all of these addresses are being used by public
networks. Many of these addresses are reserved and are unavailable for public
use. This has led to the depletion of number of addresses that can be allocated
as public Internet addresses.
The IPv6 project began in the mid-1990s, well before the threat of IPv4
limitations was upon us. Now network hardware and software are equipped
and deploying IPv6 addressing. IPv6 offers a number of improvements. The
most notable is its ability to handle growth in public networks. IPv6 uses a
128-bit addressing scheme, allowing a huge number of possible addresses:
340,282,366,920,938,463,463,374,607,431,768,211,456
Example: 2001:0:4137:9e50:2811:34ff:3f57:febc
An IPv6 address can be simplified by removing the leading 0s within each 16-
bit block. Not all the 0s can be removed, however, because each address block
must have at least a single digit. Removing the 0 suppression, the address
representation becomes
2001:0000:4137:9e50:2811:34ff:3f57:febc
Some of the IPv6 addresses you will work with have sequences of 0s. When
this occurs, the number is often abbreviated to make it easier to read. In the
preceding example you saw that a single 0 represented a number set in
hexadecimal form. To further simplify the representation of IPv6 addresses, a
contiguous sequence of 16-bit blocks set to 0 in colon hexadecimal format can
be compressed to ::, known as the double colon.
Of course, there are limits on how the IPv6 0s can be reduced. 0s within the
IPv6 address cannot be eliminated when they are not first in the number
sequence. For instance, 2001:4000:0000:0000:0000:0000:0000:0003 cannot be
compressed as 2001:4::3. This would actually appear as 2001:4000::3.
When you look at an IPv6 address that uses a double colon, how do you know
exactly what numbers are represented? The formula is to subtract the number
of blocks from 8 and then multiply that number by 16. For example, the
address 2001:4000::3 uses three blocks—2001, 4000, and 3. So the formula is
as follows:
(8 – 3) * 16 = 80
Therefore, the total number of bits represented by the double colon in this
example is 80.
Note:
(0s) - You can remove 0s only once in an IPv6 address. Using a
double colon more than once would make it impossible to determine
the number of 0 bits represented by each instance of ::.
At various points during the lease (normally the 50 percent and 85 percent
points), the client attempts to renew the lease from the server. If the server
cannot perform a renewal, the lease expires at 100 percent, and the client stops
using the address.
In addition to an IP address and the subnet mask, the DHCP server can supply
many other pieces of information; although, exactly what can be provided
depends on the DHCP server implementation. In addition to the address
information, the default gateway is often supplied, along with DNS
information.
In addition to having DHCP supply a random address from the scope, you can
configure it to supply a specific address to a client. Such an arrangement is
known as a reservation. Reservations are a means by which you can still use
DHCP for a system but at the same time guarantee that it always has the same
IP address. DHCP can also be configured for exclusions. In this scenario,
certain IP addresses are not given out to client systems.
When the client receives the offer, it looks at the offer to determine if it is
suitable. If more than one offer is received, which can happen if more than one
DHCP server is configured, the offers are compared to see which is best. Best
in this context can involve a variety of criteria but normally is the length of the
lease. When the selection process completes, the client notifies the server that
the offer has been accepted, through a packet called a DHCPRE-QUEST
packet. At this point the server finalizes the offer and sends the client an
acknowledgment. This last message, which is sent as a broadcast, is known as
a DHCPACK packet. After the client system receives the DHCPACK, it
initializes the TCP/IP suite and can now communicate on the network.
Self-Assessment Questions
Exercise 3.6
1. The versions of IP addresses are IP version 4 and IP version…..
a. 8
b. 3
c. 2
d. 6
2. How many bit long is IP version 4?
a. 10 bits long
b. 20 bits long
c. 32 bits long
d. 128 bits long
3. Private IPs are routable on the Internet.
True/False
4. Class C IP address range starts from 192 to…
a. 193
b. 128
c. 255
d. 223
5. Which of the following is a private IP address?
a. 192.167.2.3
b. 172.21.3.98
c. 192.11.28.23
d. 11.200.2.88
6. DHCP server supplies only IP addresses to clients on a network.
True/False
Unit Outline
Session 1: General Media Considerations
Session 2: Types of Network Media – Guided and Unguided media
Session 3: Types of Network Media – The Twisted Pair Cable
Session 4: Network media – Coaxial Cable
Session 5: Network media - Fibre-Optic Cables
Session 6: Unguided Media or Wireless Media
Unit Objectives
By the end of the unit, you should be able to:
1. Define network media or communication channel
2. List and explain types of network media or communication channel
3. Mention cables and their connectors and other media connectors
4. Demonstrate how different kinds of cables are prepared
5. Explain modulation and demodulation with respect to modems
6. Understand asynchronous transmission interface standard multiplexing
of signals
Objectives
By the end of session, you should be able to:
a) understand what to consider before selecting a particular media for your
network
Read on now…
Transmission rates normally are measured by the number of data bits that can
traverse the medium in a single second. In the early days of data
communications, this measurement was expressed in bits per second (bps), but
today’s networks are measured in Mbps (megabits per second) and Gbps
(gigabits per second).
The different network media vary greatly in the transmission speeds they
support. Many of today’s application-intensive networks require more than the
10Mbps offered by the older networking standards. In some cases, even
100Mbps, which is found in many modern LANs, is simply not enough to
meet current network needs. For this reason, many organizations deploy 1Gbps
networks, and some now even go for 10Gbps implementations.
2. Signaling Method
Signing method is a way of transmitting signal from one device to the other
through a network medium. The signing methods Broadband Versus Baseband
Networks employ two types of signaling methods:
i. Baseband transmissions use digital signaling over a single wire.
Communication on baseband transmissions is bidirectional, allowing
signals to be sent and received, but not at the same time. To send
multiple signals on a single cable, baseband uses something called Time
Division Multiplexing (TDM). TDM divides a single channel into time
slots.
ii. Broadband transmissions: In terms of LAN network standards,
broadband transmissions use analog transmissions. For broadband
transmissions to be sent and received, the medium must be split into two
channels. Multiple channels are created using Frequency Division
Multiplexing (FDM).
So for some cables like the twisted pair, the maximum segment length is
100meters while coaxial cables are between 185 and 500 meters for Thinnet
and Thicknet coaxial cables respectively. Fibre optics cable has the longest
maximum segment length.
5. Ease of installation
The difficulty of installing a cable plant has a bearing on your choice of media.
Cable plant is the term for all the cables and connectors tying your network
together. Sometimes you have to make a tradeoff between the highest quality
available and the cost and time factors involved in installing the medium
correctly.
Some factors that must be considered are a medium’s minimum bend radius,
which limits the angle at which a cable can be bent to run around corners; the
cost and time needed to terminate the medium, which involves installing
connectors and attaching media to patch panels and jacks; and the physical
environment.
6. Testability
How difficult and expensive is it to test the medium after it’s installed?
Declaring a cable installation successful just because computers can
communicate doesn’t really constitute a test. A network that “works” might be
7. Total Cost
When figuring the total cost for media, you must include the cabling,
connectors, termination panels, wall jacks, termination tools, testing
equipment, and, of course, time. The complexity of a large media installation
(for a new building, for example) can be daunting, which is why there are
companies specializing in media installation. In almost all cases, fiber-optic
cabling costs considerably more than copper cabling for all components. When
you need fiber-optic cabling, however, there’s really no substitute. Some
people opt for a wireless network because of the cost of wired components, but
wireless networks are often not the solution when there are many users
requiring high bandwidth. As a network administrator, you need to factor in all
costs as well as users’ needs before deciding which media types to use and in
which situations. A combination of types tends to be the norm in today’s
networks.
full duplexing can transmit and receive simultaneously. This means that
100Mbps network cards theoretically can transmit at 200Mbps using full-
duplex mode.
Ethernet Standards
Ethernet can operate at different speeds over different types of media, and each
variation is associated with an IEEE standard. The following sections discuss
many of these standards, some of which are obsolete or had limited use.
Standards Terminology Ethernet standards are generally expressed in one of
two ways.
1. One way is using the IEEE document number defining the standard. For
example, IEEE 802.3 is the parent document specification for 10 Mbps
Ethernet using thick coaxial cable.
2. The second way of expressing an Ethernet standard is to use the XBaseY
terminology. Most IEEE 802.3 documents describe the transmission speed,
type of transmission, and length or type of cabling and are designated with
terms such as 100BaseT. In 100BaseT, for example, the “100” denotes the
speed of transmission (100 Mbps), the “Base” indicates a base-band
signaling method, and the “T” specifies twisted-pair cabling. All the BaseT
Ethernet standards use a physical star topology. The following sections
discuss the major standards and their designations.
Self-Assessment Questions
Exercise 4.1
1. What determines the direction in which data can flow through the
network media?
A. Transmission mode
B. Dialog mode
C. Token passing
D. Direction mode
2. Which communication flow in one direction in a network, the
communication is termed at as…….
CoDEUCC/Bachelor in JHS Education 135
UNIT 4 GENERAL MEDIA CONSIDERATIONS
SESSION 1
Objections
By the end of this session, you should be able to:
1. List types of network media
2. Categorize standard media types and associate properties.
3. Categorize standard connector types based on network media
Guided Media
Guided transmission media refers to transmission media that directly connect
communication devices with each other via wires or physical media for data
transmission. Guided media is also known as cable-based media or bounded
media because the data signals are enclosed to a cabling media. There are three
main types of guided media, namely;
1. Twisted pair cable
CoDEUCC/Bachelor in JHS Education 137
TYPES OF NETWORK MEDIA:
UNIT 4
SESSION 2 GUIDED AND UNGUIDED
Advantages:
1. It is used for long distance communication.
2. It has high speed data transmission.
3. Many receiver stations can receive signals from same sender station.
Disadvantage
1.It is very costly.
2. Radio waves travel through Lowest portion of atmosphere
Self-Assessment Questions
Exercise 4.2
1. Distinguish between guided and unguided communication
channels
2. Give two examples each of guided and unguided transmission media
Objectives
By the end of this session, you should be able to:
1. Describe the features of twisted pair cable
2. Mention the types of twisted pair cable
3. Explain the advantages and disadvantages of twisted pair cables
Twisted-pair and coaxial cables both use copper wire to conduct the signals
electronically; fiber-optic cable uses a glass or plastic conductor and transmits
the signals as light. For many years, coaxial was the cable of choice for most
LANs. Today, twisted pair has proven to be the cable medium of choice, thus
retiring coaxial to the confines of storage closets. Fiber-optic cable has also
seen its popularity rise but because of cost it has been primarily restricted to
use as a network backbone where segment length and higher speeds are
needed. That said, fiber is now increasingly common in server room
environments as a server-to-switch connection method, and in building-to-
building connections in metropolitan area networks (MANs).
Twisted pair wire is popular today because it is lighter, more flexible, and
easier to install than coaxial or fiber-optic cable. It is also cheaper than other
media alternatives and can achieve greater speeds than its coaxial competition.
These factors make twisted pair the ideal solution for most network
environments.
Note
A third type of twisted-pair cable, Screened Twisted Pair (ScTP) , is
available, but it isn’t widely deployed. ScTP encases all the wires in the cable
within a single shield. This is in contrast to standard STP cable, which uses
the same shield but also encases each individual wire with shielding. ScTP is
cheaper than STP, but it is still more expensive than UTP.
Two additional categories aren’t yet TIA/EIA standards and might never be in
the United States. However, Europe has accepted the Category 7 and Category
7a standards, which specify a fully shielded twisted-pair cable (each wire pair
is shielded, as is the outer sheath) with performance characteristics well above
earlier cabling standards. Signaling rates are specified at up to 600 MHz for
Cat 7 and 1000 MHz for Cat 7a. Because of a different connecting hardware
design, these cables and connectors aren’t likely to be backward-compatible.
Cat 7 and 7a are ISO/IEC 11801 standards, and their use in the upcoming 40
and 100 Gigabit Ethernet standards is uncertain. These two categories of cable
might have a short life if they aren’t specified in a widely adopted networking
standard.
RJ-45 jacks—An RJ-45 jack (also known as Keystone) is what you plug an
RJ-45 connector into when the computer is in a work area away from hubs and
switches. It has a receptacle for an RJ-45 plug on one side and a place to
terminate, or “punch down,” the TP cabling on the other side. RJ-45 jacks are
usually placed behind wall plates when cables are run inside walls but can also
be recessed into the floor or placed in surface-mounted boxes if the cabling
runs on the outside of walls.
Patch panel
The patch panel looks like the switch but it is not a switch. It is sometimes
referred to as a passive switch. Patch panels are used to terminate long runs of
cable from the work area (where the computers are) to the wiring closet (where
the switches and hubs are). Patch panels are like RJ-45 jacks, in that they have
a receptacle on one end and punchdown terminals on the other, but a patch
panel can usually accommodate 12, 24, or 48 cables. Example is shown in the
pictures below and it shows the front side of a patch panel, where a patch cable
plugs in, and the back side, where long runs of cable are terminated.
To terminate cable at an RJ-45 jack or a patch panel, you need the following
tools:
• Bulk UTP cabling
• Wire cutters or electrician’s scissors
• Cable stripper
• Type 110 punchdown tool
• Cable tester
• RJ-45 jack and patch panel
Cable Preparations
One of the most important aspects of making a cable or terminating a cable at a
jack or patch panel is to get the coloured wires arranged in the correct order.
There are two competing standards for the arrangement of wires: TIA/EIA
568A and TIA/EIA 568B. Either standard is okay to follow, as long as you
stick to one throughout your network. The arrangement of wires for both
standards is shown just below.
Pinout Positions
Pinout positions refer to the arrangement of pins on an integrated circuit. The
difference between the two standards is the location of the orange and green
pins.
EIA/TIA 568A
EIA/TIA 568B
- Rollover Cable: Rollover cables are also referred to as console cables and
have opposite pinout positions on each end of the cable. Dissimilar to
crossover cables and straight-through cables, rollover cables are designed to
create an interface with the device rather than carry data.
They are used to connect to routers and manageable switches for configuration
and setups.
5. While holding the RJ-45 plug in one hand with the clip facing away from
you, insert the eight wires into the connector, making sure the tops of wires
extend to the front of the connector and the cable jacket goes far enough
into the connector so that the jacket will be caught by the crimp bar.
6. Now insert the RJ-45 connector into the crimping tool, and make sure the
wires don’t slip. Squeeze the handle on the crimping tool firmly. It might
take a little hand strength or using two hands, depending on the crimping
tool’s quality. This tool does two things. First, it forces the eight small
contacts at the top of the plug down onto the wires; the contacts are pushed
just far enough in that they slice through the insulation on each wire,
thereby making an electrical contact with the wire. Second, the strain-relief
bar is pushed in to grab the cable’s outer jacket, making it more difficult to
pull the wires out of the plug.
7. Repeat the process for the other end of the cable, and test with a cable
tester, if available. Congratulations! You have made a patch cable.
8. If time and materials allow, make a crossover cable, using the 568B wiring
scheme on one end and the 568A wiring scheme on the other. Keep your
tools handy for the next project.
This is session has been very long but I believe you have
learnt a lot. In this session we focused on the twisted pair
cable. We looked at the types and categories of the Unshielded twisted pair.
We also looked at the advantages and disadvantages of twisted pair cable.
Don’t forget you have two assignments to perform. That brings us to the end of
this session.
Self-Assessment Questions
Exercise 4.3
1. Distinguish between the shielded twisted pair and unshielded
twisted pair cables
2. State three (3) categories of unshielded twisted pair cable.
Objectives
By the end of session, you should be able to:
1. describe the coaxial cable
2. state the characteristics of coaxial cable
3. explain the advantages and disadvantages of coaxial
Coaxial Cable
The coaxial cable is not any new cable. It looks just like the TV cable that we
already know. We have been using the TV cable, right? Yes, it means you
know coaxial cable. However, the kind of coaxial cable used in computer
networking is a different grade.
A copper mesh is used to cover the insulated copper wire. It also protects the
cable from electromagnetic waves.
Coaxial cable is the same cable that is used for television. This cable is used
for long-distance telephone lines and local area networks for voice and data
transmission with very high frequency.
Coaxial cable bandwidth is 80 times higher than the twisted-pair wire. So, it is
more expensive than twisted pair. It is constructed in this way to add resistance
to attenuation (the loss of signal strength as the signal travels over distance),
crosstalk (the degradation of a signal, caused by signals from other cables
running close to it), and EMI.
Advantages
1. High bandwidth
2. Use in long-distance telephone lines
3. 10Mbps high-speed digital signal transmission
4. Transfer data safely
5. Compared to twisted pair cables, they can have higher speeds and better
protection over long distances.
Disadvantages
1. Failure of one cable will disrupt the entire network
2. Difficult and expensive installation
3. If the protector is defective, it is possible to create a ring
Performance
Although these types of cables have more bandwidth and speed compared to
twisted pair cables, the voltage drop and signal attenuation is more and
requires repeated use of a repeater.
Application
Analog TV networks
Cable TV networks
In Ethernet networks
Ethernet-based LANs using thick cable RG8/U cable that is 0.4 inch in
diameter for internet-connection are referred to as Thicknet or10Base5
systems. Here 10 means 10Mbps speed that this cable can offer, Base means
baseband, and 5 represents the maximum distance 500 meters recommended
between nodes/repeaters.
Thick coax was used primarily for backbone cable. It could be run through
plenum spaces because it offered significant resistance to EMI and crosstalk
and could run in lengths up to 500 meters. Thick coax offers speeds up to
10Mbps, far too slow for today’s network environments. It is also known as
10Base5. Its connector is the vampire taps
Connectors
BNC connector for Thinnet
T-Connector
Thicknet connector
Vampire tap
Self-Assessment Questions
Exercise 4.4
1. What is the connector for thin coaxial cable?
A. BNC connector
B. vampire taps
C. RJ45
D. RJ11
2. The maximum distance for thicknet coaxial cable is ….meters.
A. 100
B. 200
C. 185
D. 500
Objectives
By the end of this session, you should be able to:
1. briefly describe the fibre-optic cable
2. state the characteristics of the fibre-optic cable
3. explain the advantages and disadvantages of using fibre-optic in networking.
In addition, the best advantage of fiber optics is that data is already in binary
form and it just needs to be converted into light only. It can transmit data up to
billions of bits per second. The main disadvantage of fiber optics is that it is
very expensive and also difficult to install and modify.
Fibre cable
Advantages
1. High bandwidth:
In particular, fiber-optic cable is a good medium for high-bandwidth, high-
speed, long- distance data transmission because of its lower attenuation
characteristics and vastly higher bandwidth potential.
2. Less attenuation of signals
Voltage drop as well as the need for repeaters is less compared to coaxial cable
and twisted pair cable.
166 CoDEUCC/Bachelor in JHS Education
NETWORK MEDIA AND TRANSMISSION
UNIT 4
TECHNOLOGIES SESSION 5
Disadvantages
1. It is moderately difficult installation.
2. Its maintenance procedures of fiber often require skilled technicians with
specialized tools.
3. Furthermore, the cost of a fiber-based solution limits the number of
organizations that can afford to implement it.
4. Another sometimes hidden drawback of implementing a fiber solution is
the cost of retrofitting existing network equipment.
5. Fiber is incompatible with most electronic network equipment. This means
you have to purchase fiber-compatible network hardware.
Fiber-Optic Connectors
A wide variety of connectors can be used with fiber-optic media, depending on
the light- emitting sources used to generate light pulses and the corresponding
light-detecting sensors used to detect them.
• Straight tip—Straight tip (ST) connectors join fibers at cross-connects or to
optical devices. They’re used most often in Ethernet networks with fiber-
optic cable as backbone cabling. An ST connector locks onto the jack when
twisted.
Fiber-Optic Installation
Installing fiber-optic networks is somewhat more difficult and time consuming
than copper media installation. However, advances in connector technology
have made field termination of fiber-optic cables almost as fast and easy as
copper terminations. The connectors and test equipment required for
termination are still considerably more expensive than their copper
counterparts, but the trend toward easier, more affordable fiber-optic networks
There are several methods for terminating fiber-optic cables because of the
many connectors and cable types available, so installation details are beyond
the scope of this book. Before embarking on a fiber-optic termination task, you
need to purchase a fiber-optic termination kit, which can range from several
hundred to several thousand dollars. Some tools in a typical fiber-optic
termination kit include the following:
• Buffer tube stripper—A tightly calibrated tool designed for stripping
buffer tubes off the glass fiber strand without breaking the fiber
• Cable stripper—Used to remove the fiber cable’s outer sheath; much
like the cable stripper used with UTP
• Crimper—Used with connectors that use crimping as the method to fix
the connector to the cable
• Diamond cleaver—Used to cut glass fiber cleanly without shattering
the end
• Inspection scope—Used for examining the end of a fiber strand to
make sure it’s clean and polished
• Polishing tool—Used to polish the end of a cleaved (cut) strand of fiber
Self-Assessment Questions
Exercise 4.5
1. State two characteristics of the fibre-optic cable
2. Discuss three reasons why you may prefer fibre-optic cable to copper cables
such as twisted pair or coaxial cable.
3. List three connectors for fibre-optic cables
4. Distinguish between the single mode and multimode fibre-optic cables.
Objectives
By the end of this session, you should be able to
1. define wireless media or wireless network
2. state the characteristics of wireless media
3. discuss types of wireless networks
4. explain the advantages and disadvantages of using wireless networks
Wireless technologies are playing a bigger role in all kinds of networks. Since
1990, wireless options have increased, and the cost of these technologies
continues to decrease. As wireless networking has become more affordable,
demand has increased, and as demand increases, so does production of wireless
equipment, which brings prices down even more. For this reason, wireless
networks can now be found in most towns and cities in the form of hotspots,
and many home users have turned to wireless networks so that their computers
are no longer tethered to a network cable.
The adjective “wireless” might lead you to believe that wireless networks have
no cabling of any kind. However, wireless networks are often used with wired
networks to interconnect geographically dispersed LANs or groups of mobile
users with wired servers and resources on a wired LAN. Networks including
both wired and wireless components are called “hybrid networks.” Indeed,
even in home or small business networks with workstations connecting to a
wireless AP or router, the AP or router usually connects to the Internet via a
wired connection to a cable modem or similar device. Probably the only truly
wireless networks are ad hoc networks or small infrastructure networks put
together for the purpose of sharing files among a small group of people.
Today, wireless local area networks (WLANs) provide a flexible and secure
data communications system that augments an Ethernet LAN or, in some
cases, replaces it. Wireless transmissions send and receive data using radio
frequency (RF) signals, freeing you from wired solutions.
Client systems communicate with a wireless access point using wireless LAN
adapters. Such adapters are built into or can be added to laptops, Personal
Digital Assistant (PDAs), or desktop computers. Wireless LAN adapters
provide the communication point between the client system and the airwaves
via an antenna.
Wireless Benefits
Wireless networking has a lot of appeal in many circumstances and can offer
the following capabilities:
Create temporary connections to existing wired networks.
Establish backup or contingency connectivity for existing wired networks.
Extend a network’s span beyond the reach of wire-based or fiber-optic
cabling, especially in older buildings where rewiring might be too
expensive.
Allow businesses to provide customers with wireless networking easily,
thereby offering a service that gets customers in and keeps them there.
Enable users to roam around a corporate or college campus with their
machines.
Wireless Frequencies
The following are the most common frequencies for wireless data
communication:
● Radio—10 KHz to 1 GHz (gigahertz)
● Microwave—1 GHz to 500 GHz
● Infrared—500 GHz to 1 THz (terahertz)
We can set up wireless networks as local area networks. These are called
Wireless LANs. Wireless LANs make use of four main technologies for
transmitting and receiving data, discussed in the following sections:
1. Infrared
2. Laser
3. Narrowband (single-frequency) radio
4. Spread-spectrum radio
Organizations that want frequencies for their exclusive use in specific locales
must complete a time-consuming, expensive application process before being
granted the right to use them. Because of the difficulty in securing exclusive
use, the FCC or NCA sets aside certain frequencies for unregulated use, such
as the ones at which cell phones and remote-control toys operate. As wireless
networking and other forms of wireless communication become more popular,
crowding of these frequencies could become a problem.
Depending on the frequency, walls or other solid barriers can block signals and
prevent transmission and reception. Interference from other radio sources is
also possible, particularly if the devices broadcast in the unregulated frequency
ranges, as most wireless LAN technologies do. As with any broadcast
technology, anyone within range of the network devices could eavesdrop on
network communication. For narrowband radio technologies, this range is
quite short. Table 4-3 summarizes the characteristics of narrowband wireless
LAN technologies.
4. Spread-Spectrum LAN
Technologies Spread-spectrum radio addresses several weaknesses of single-
frequency communications, whether high or low power. Instead of using a
single frequency, spread-spectrum uses multiple frequencies simultaneously,
thereby improving reliability and reducing susceptibility to interference. Also,
using multiple frequencies makes eavesdropping more difficult.
7. Satellites
The other main alternative for microwave transmission is satellite. Instead of
aiming at transmitters or receivers within a clear line of sight on the ground,
satellite microwave systems send and receive data from geosynchronous
satellites that maintain fixed positions in the sky. This is how TV signals and
some long-distance phone signals travel from one side of the world to another:
The sender beams the signal to a satellite visible on the horizon, the satellite
relays the signal to one or more satellites until it comes onto the receiver’s
horizon, and then the satellite redirects the signal to the receiver.
Depending on the size of the network, one or more APs might be required.
Additional APs are used to allow access to more wireless clients and to expand
the range of the wireless network. Each AP is limited by a transmission
range—the distance a client can be from an AP and still get a usable signal.
The actual distance depends on the wireless standard being used and the
obstructions and environmental conditions between the client and the AP.
Factors affecting wireless transmission ranges are covered later in this chapter.
You can use an AP in an infrastructure wireless network design. Used in the
infrastructure mode, the AP receives transmissions from wireless devices with
- in a specific range and transmits those signals to the network beyond. This
network might be a private Ethernet network or the Internet. In infrastructure
wireless networking, multiple access points might cover a large area or only a
single access point for a small area, such as a single home or small building.
IEEE 802.11: There were actually two variations on the initial 802.11 wireless
standard. Both offered 1 or 2Mbps transmission speeds and the same RF of
2.4GHz. The difference between the two was in how data traveled through the
RF media. One used FHSS, and the other used DSSS. The original 802.11
standards are far too slow for modern net- working needs and are now no
longer deployed.
IEEE 802.11a
Created in 1999, this version of Wi-Fi works on the 5GHz band. This was done
with the hope of encountering less interference since many devices (like most
wireless phones) also use the 2.4GHz band. 802.11a is fairly quick, too, with
maximum data rates topping out at 54Mbps. However, the 5GHz frequency has
more difficulty with objects that are in the signal's path, so the range is often
poor.
IEEE 802.11b
Also created in 1999, this standard uses the more typical 2.4GHz band and can
achieve a maximum speed of 11Mbps. 802.11b was the standard that kick-
started Wi-Fi's popularity.
IEEE 802.11g
Designed in 2003, the 802.11g standard upped the maximum data rate to
54Mbps while retaining usage of the reliable 2.4GHz band. This resulted in the
widespread adoption of the standard.
IEEE 802.11n
Introduced in 2009, this version had slow initial adoption. 802.11n operates on
both 2.4GHz and 5GHz frequencies, as well as supporting multi-channel
usage. Each channel offers a maximum data rate of 150Mbps, which means the
standard's maximum data rate is 600Mbps.
IEEE 802.11ac
The ac standard is what you will find most wireless devices using at the time of
writing. Initially released in 2014, ac drastically increases the data throughput
for Wi-Fi devices up to a maximum of 1,300 megabits per second.
Furthermore, ac adds multi-user, multiple-input, multiple-output technology
(MU-MIMO) support, additional Wi-Fi broadcast channels for the 5GHz band,
and support for more antennas on a single router.
IEEE 802.11ax
Next up for your router and your wireless devices is the ax standard. As ax
completes its rollout, you will have access to theoretical network throughput of
10Gbps—around a 30-40 percent improvement over the ac standard.
Furthermore, wireless ax will increase network capacity by adding broadcast
Maximum cable
Type Bandwidth Installation Interference Cost
length
10–10,000
UTP 100 m Easy High Cheapest
Mbps
16–10,000
STP 100 m Moderate Moderate Moderate
Mbps
Thinnet 185m 10 Mbps Moderate Moderate Obsolete
Thicknet 500m 10 Mbps Moderate Moderate Obsolete
Fiber 100 Mbps–10 Most
2–100 km Moderate None
optic Gbps expensive
None for
11 to 300
Wireless 100-300 feet Easy Moderate physical
Mbps
media
Self-Assessment Questions
Exercise 4.6
100BaseFX 100 Ethernet using baseband signaling over two strands of fiber-
Mbps optic cabling.
802.11i A security extension to 802.11 and a successor to Wi-Fi
Protected Access; currently the strongest security protocol
for wireless networks. See also Wi-Fi Protected Access
(WPA).
Access Point A wireless device that serves as the central connection point
(AP) of a wireless LAN and mediates communication between
wireless computers.
Fiber-Optic A cable type that carries data over thin strands of glass by
Cable using optical (light) pulses to represent bits.
Crossover A type of patch cable that uses the 586B standard on one
Cable end and the 586A standard on the other end. This
arrangement crosses the transmit and receive wires so that
transmit on one end connects to receive on the other end.
Often used to connect two devices of the same type to one
another—for example, connecting a switch to a switch.
Physical Layer Layer 1, the bottom layer of the OSI model, transmits and
receives signals and specifies the physical details of cables,
NICs, connectors, and hardware behavior. See also Open
Systems Interconnection (OSI) reference model.
196 CoDEUCC/ Bachelor in JHS Education
GLOSSARY
Simple Mail The standard proto- col for sending e-mail over the Internet.
Transfer
Protocol
(SMTP)
Wireless The name given to the 802.11 series of IEEE standards that
Fidelity (Wi-Fi) define four common varieties of wire- less LANs: 802.11a,
802.11b, 802.11g, and 802.11n.